?
Solved

How to disable desk.cpl / screen settings

Posted on 2008-11-11
3
Medium Priority
?
1,100 Views
Last Modified: 2012-06-27
Hello

How to disable desk.cpl / screen settings via regdb?

Thanks

Mike
0
Comment
Question by:mikeydk
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
aherps earned 1000 total points
ID: 22928535
Create a dword, 'NoDispCPL' and set the value to 1

in the following folder in regedit:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
0
 
LVL 7

Expert Comment

by:myhc
ID: 22928560
I think you can still run desk.cpl if you use the above.
You can use group poliy "gpedit"

Within this you can set that you want to lock setting and hide tabs within .cpl files.
This can also be controlled by a central server.

0
 
LVL 7

Expert Comment

by:aherps
ID: 22928572
You get an administrator disabled message by adding the dword into the registry

However, you can also use gpedit as per myhc comments
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article (http://rdsrc.us/u3GP7A) first and run the tool TDSSKiller (http://rdsrc.us/GDBBs4) to get rid of the infection. Once done, and if the …
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question